Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2024 12:44
Behavioral task
behavioral1
Sample
Abotihy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Abotihy.exe
Resource
win10v2004-20231215-en
General
-
Target
Abotihy.exe
-
Size
104KB
-
MD5
a62ed6e2054cf8d2e62c02c83b3f07c7
-
SHA1
af778b353cf5d24172339d084722811c7a088668
-
SHA256
8731e05790767c76250fff12cf1ecbf497889776be13aef569cc71f0aad97039
-
SHA512
9cce378e77dfb58a0740cb07a0f951971a5a52143c1c600181286b7c9d3e0a4aa0f03b1b754d9bdb08847c22d478240ba11236fe089197081867483f45175272
-
SSDEEP
3072:1jDx+/YuqZK9WDIciaK5C0dAoz1+wEKSK0M:5ZueBoz1/EK4
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot5358754228:AAE42HAGW1bzIPxU7iVRC_96iDuHcwSjjVo/sendMessage?chat_id=5556872222
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
Abotihy.exepid process 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe 2092 Abotihy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Abotihy.exedescription pid process Token: SeDebugPrivilege 2092 Abotihy.exe